官术网_书友最值得收藏!

Summary

In this chapter, we looked at information gathering and vulnerability scanning. We defined the difference between active and passive information gathering. We worked through the various tools that can be used for passive and active information gathering, and the tools that are needed for vulnerability scanning. Lastly, we worked through packet captures using graphical and command-line tools.

You now have the ability to perform information gathering using open source intelligence, which is passive information gathering. You have learned how to use Nmap for active information gathering, and how to leverage the Nmap scripting engine. You have gained the necessary skills to use vulnerability scanners such as OpenVAS and Nessus, and know how to perform a vulnerability scan to plan your attack. Packet capturing has taught you how to sniff traffic traversing a network, and how you can obtain valuable information from insecure protocols.

In the next chapter (Chapter 4, Mastering Social Engineering), we will look at what social engineering is and the different tools that you can use to perform social engineering. We will leverage built-in tools within Kali Linux, along with some additional tools that will need to be installed.

主站蜘蛛池模板: 邯郸市| 大港区| 万州区| 仁寿县| 太康县| 大安市| 中宁县| 汽车| 高州市| 松原市| 贵港市| 钦州市| 高雄县| 乐昌市| 吴江市| 扶风县| 五台县| 三门峡市| 姜堰市| 江永县| 吉林市| 雷州市| 隆安县| 贡嘎县| 宜良县| 云龙县| 江都市| 梨树县| 赞皇县| 四平市| 微博| 克什克腾旗| 晴隆县| 宁强县| 赤水市| 天长市| 四子王旗| 白山市| 吐鲁番市| 临泽县| 拉萨市|